Unisys Investigated For Covering Up Cyber-Attacks 114
Stony Stevenson writes "Unisys, a major government IT contractor, is reportedly being investigated for failing to detect cyber-attacks, and then covering up its failings. Two US congressmen have called for an investigation into cyber-attacks aimed at the Department of Homeland Security, along with a contractor (that would be Unisys) charged with securing those networks. 'The House Committee on Homeland Security's investigations led them to believe the department is under attack by foreign powers, and could be at risk because of "incompetent and possibly illegal activity" by a US contractor. The congressmen didn't name the contractor in the letter. However, the Washington Post on Monday reported that the FBI is investigating Unisys, a major information technology firm with a $1.7 billion Department of Homeland Security contract, for allegedly failing to detect cyber break-ins traced to a Chinese-language Web site and then trying to cover up its deficiencies.'" Unisys denies it all.
Re: (Score:3, Insightful)
Re: (Score:3, Insightful)
For reference, see SOX.
And in any case... (Score:3, Informative)
FWIW, Unisys didn't exist in the seventies. I was there. I worked on both types of kit (in those days you either went with the herd and learned to use IBM, or you learned to be versatile).
IIRC it came about via the merging of Burroughs and Sperry/UNIVAC in about 1986 (in fact, to be specific, I think Burroughs swallowed Sperry).
Re: (Score:2)
IIRC it came about via the merging of Burroughs and Sperry/UNIVAC in about 1986 (in fact, to be specific, I think Burroughs swallowed Sperry).
Two Dinosaurs mating will not produce a mammal.
Re:Typical unisys (Score:5, Interesting)
This is a big part of the problem. The vast majority of Government Contractors are only marginally qualified and got their jobs by having the clearance, not by being technically proficient. This is known as "warm bodies" syndrome since many contracts pay per position filled. Getting a clearance can take years, depending on the level, and usually takes months, so this is a high barrier to entry and keeps a lot of smart people out.
There are many very capable and well-qualified people in Government Contracting, but they are a minority. Of course, Management, being what it is, doesn't want to give bad news to a customer, so sometimes they "muddy the waters".
Re: (Score:2)
Re: (Score:1)
Don't tell me it can't be so.
Re:Typical unisys (Score:4, Informative)
Re: (Score:2)
Re: (Score:1)
Re: (Score:2)
Re: (Score:1)
Re: (Score:3, Interesting)
I know this, because I worked for IBM in a government data center at the time. We handled the big iron (oddly enough, including some machines from Sun and some ancient AS/400s) and the Unisys flunkies did operations and tape library stuff (cartridge and reel to reel). DOT, IRS, etc stuff. Believe it or not, they had PCs in there running Win95 and NT4 with no egress filtering to the internet... There were qui
Re: (Score:2)
Re: (Score:1)
Re: (Score:2)
Sometimes yes, sometimes no. I'm a former full-time employee of Unisys, and used to do pre-sales architecture and systems engineering for them. On one particular contract we worked on, there were a couple of us full-timers to do architecture, another to handle the PM angle, several short-timers to do write code and DBA work, and a couple of outsourced coders.
Also, a PM outsourced from our Indian contractor.
Re: (Score:2, Funny)
I fart in your general direction !
Re: (Score:3, Informative)
circle of competitors and those competitors rehire most of the people who were on the contract.
In fact that is so common you usually take your tenure / seniority with you to the
next company. When a contract changes hands, it really means the management layer
and the interface between management and the government is being changed. Workers
by and large keep their jobs.
Re: (Score:2)
How did "never made it out of the seventies" and "probably outsourced... to india" make it into the same post? Might I recommend you read and/or watch The Commanding Heights by Daniel Yergin?
http://en.wikipedia.org/wiki/Commanding_Heights:_The_Battle_for_the_World_Economy [wikipedia.org]
hmmmm (Score:1)
Did you take some time before speculating? Because it's obvious you don't even know the basics:
``just another tech dinosaur that never made it out of the seventies,,
Unisys was formed in 86. As always, the least one can do before posting on Slashdot is to glance at http://en.wikipedia.org/wiki/Unisys [wikipedia.org]
Re: (Score:2)
Out-of-country non-nationals are not about to be supporting contracts to DoD or DHS that require security clearances.
Re: (Score:1)
I know this was meant as a joke, but just like all blond jokes annoy blonds, this annoys me, why, cause I'm an Indian. Further, I have been competing quite well against the best and the brightest US of A has to offer. There are a significant number of Indians in the silicon valley. Further, those crappy tech support are crappy not because they are in India, but because Corporate American Enterprises owning them want them that way, simply its cheap. hires B
Re: (Score:2)
Quite. Any non-techy performing technical support off a script, whether they have annoying New Yorker accents or arguably more understandable South Asian ones, are g
One Million Dollars. (Score:3, Funny)
No.2: Ahem...well, don't you think we should maybe ask for *more* than a million dollars? I mean, a million dollars isn't exactly a lot of money these days. Unisys alone makes over one million dollars a year!
Dr. Evil: Really?
No.2: Mm-hmm.
Dr. Evil: That's a number. Okay then. We hold the Department of Homeland Security ransom for.....One Point Seven BILLION DOLLARS!!
Re: (Score:2)
Have you seen Unisys' quarterly reports recently? I'm not quite sure that's the case.
(joking. They still make a ton of money. Just not as much as they need to support themselves.)
oh... (Score:1)
Re: (Score:2)
What really happened (Score:1)
Hey DHS, look for servicer.exe in the registry. Put a semi colon in front of the key. I'll sent you a bill. With lots of zeros.
Re: (Score:1)
Re: (Score:2)
If I could get her to lie about her age I swear I'd rent her out as a consultant. She can evrn make the VCR stop flashing 12.
Come to think of it I'll paypal anybody $5 who can show me a picture of a vcr flashing 12 inside Unisys.
Incompetence on both ends (Score:3, Interesting)
Yes, Unisys may have screwed up, but then again, its all about the better mousetrap and all...
Re: (Score:3, Informative)
Re: (Score:1)
1/2 right, 1/2 wrong. The biggest problem with most IT departments is that end users are treated as customers rather than sources of security risks and unnecessary work. Computer usage is viewed as a right rather than a revokable resource. If they didn't have to kiss asses (especially of those higher up in the food chain) many problems wouldn't occur. There would be less people with admin rights to their bo
Re: (Score:2)
Probably less software which "needs" admin rights in order to be used.
less unapproved software installed and less ge
Re: (Score:1)
In all honesty, the vast majority of users don't need anything more than email, a word processor and a web browser. You're right, though. There are specialized programs that need to have admins rights to work. Unfortunately this is the fault of developers being lazy. When I did Help Desk, some of the newer folks could never replicate problems on tickets because they didn't try using regular user accounts instead of their admin acc
Re: (Score:1)
Re: (Score:3, Insightful)
Security is actually the quest for the better mousetrap. The problem is, as soon as you have it, you get to
Re: (Score:2)
Re: (Score:2)
What I blame is the way contracts are. A contract specifies what is to be done, and a company will do that, to the point, and not an inch more. There is some regulation, written more than a year ago (in security terms, somewhere in antediluvian times), and that regulation is upheld. Why or for what, nobody cares.
And unless that attitude towards security, or any procedure,
Re: (Score:2)
Some security rules or procedures are drafted and never reviewed.
E
Re: (Score:2)
Thing is that even the initial mice are "smart rodents".
Re:Incompetence on both ends - Gov't BS (Score:3, Insightful)
"Sir, there appears to be atta
Re: (Score:2)
Re: (Score:1)
A VAX sysadmin leaves for a new job in the same facility but on a different government contract.
A few days into his new job, he realizes he could really use a script he wrote for the old job.
Rather than asking his replacement to e-mail / print / backup to tape / whatever the script,
he checks and finds he still has access to the old gear. One FTP later, Mr. Sysadmin is
doing 3-5 in Federal prison. These guys don't fark around.
Its sort of like taking out a credit
Page 2? (Score:2, Informative)
Here is page 1 anyway: http://www.washingtonpost.com/wp-dyn/content/article/2007/09/23/AR2007092301471.html?nav=rss_business [washingtonpost.com]
Re: (Score:3, Interesting)
Cyber (Score:3)
Re: (Score:2)
No. It refers primarily to the field of robotic engineering.
Re: (Score:2)
No. As I said, it has a valid meaning which is what the scientists use it for - control of physical processes via electronics (e.g. robotics). We should stop using it in immitation of those 14yo kids, as their use of it is destroying the validity of the word in serious usage.
Isn't this the governments job. (Score:1)
Good point (Score:2)
Well... (Score:4, Insightful)
missionary = mercenary (Score:1, Offtopic)
Re: (Score:1, Offtopic)
Re: (Score:1)
Re: (Score:3, Informative)
Re: (Score:2)
Surprise! Not! (Score:1)
Big contractors like these simply get slapped on the wrist and keep going on with business as usual. The same thing will happen with UNISYS
Damn (Score:2)
Re: (Score:3, Insightful)
Re: (Score:2)
Re: (Score:2)
Re: (Score:2)
Typical govt C&A hokum (Score:5, Interesting)
Re:Typical govt C&A hokum (Score:4, Informative)
Far more money gets spent on documenting that the system works correctly than actually making the system work correctly. Often you end up with a system that looks great on paper that has lots of bugs in actual operation. Lots of tests get written that look like they test something but which rarely uncover bugs. The whole exercise costs a fortune, and largely exists to satisfy auditors (whether internal or external to the company performing the exercise).
Techniques like agile programming, automated testing, code reviews, etc are shunned because they're non-traditional and don't generate lots of paper. There is a fear that in an audit a government representative who hasn't signed on to the methodology might hammer you to death over not having a 2000 page design specification and a load of tests written and executed by everybody from the programmers, to IT QA, to end users (often the same exact test gets reformatted and run by all parties just so that it can be said that everybody had a hand in testing).
I once had to evaluate whether it was safe to directly modify a particular database field in an application, and was relieved to see that this application had one of those aforementioned thick design specifications. Then I was dismayed to find out that the only documentation there was on the field was the fact that it existed, what table it was in, what it was called, what kind of field it was, and what it contained (WidgetCorrectionFactor = Factor used to Correct the Widget value - really helpful as if I couldn't have guessed that much from the field name!). Absent was any kind of documentation as to what code might reference that field or what tables might join to it. I could search the source for the field name, but then there wasn't any kind of documentation or flow charts indicating the typical system workflow or in what order the various routines might get called. It was like documenting all the cell types in an animal without bothering to indicate what the actual animal looked like and how everything went together. But the auditors loved the document.
The issue is that most often QA and management and external auditors have no way of knowing whether a piece of code actually works or not. So, instead they look for stuff they can understand - paperwork. The paperwork does tend to lead to some basic form of quality, but rarely does it lead to code that doesn't break down on all the various one-off-cases that don't make their way into human-executed tests. I'll take a simple automated test that can be executed against a matrix of input values against a complex human-executed test that only ever gets run once (and is likely not repeated every time a piece of seemingly-unrelated code is touched) any day!
Re: (Score:3, Funny)
"Configuration Management is a serious engineering discipline!"
Re: (Score:2)
One of the problems with the system is that it lets someone ignore the deficiencies by simply checking a box that says it's acceptable risk to their organization.
Not to defend Unisys's actions here, but in one article I read about this it indicates that Unisys told them they needed XYZ, but DHS responded with "But we want ABC", so that's what they gave them.
I was on a gov agency C&A a few yea
Unysis (Score:2, Interesting)
Re: (Score:2)
Re: (Score:1)
Well, (Score:2)
Re: (Score:2)
Appearantly they mean whoever wants to hack their customers and not their customers with that statement, but you can't say that they're lying.
Not a good news day for Unisys (Score:1)
Stealing Unclassified Data? (Score:1)
Re: (Score:3, Insightful)
On the other hand, classified data can include material that people CAN find out from their own observation if they happen to be in the right place at the right time. Like whether a particular vessel is in a particular location... individual o
Re: (Score:1)
On the other hand, again if I understand you correctly, what is being stolen is the ease of access to the data, not the data itself (which, being governmental and unclassified, can not be stolen). That ease of access can enable the thieves to gain insight into some of the classified data.
If most o
Re: (Score:2)
I don't know. You don't know, either.
Not all data on government systems belongs to the government. Some of it is proprietary information owned by private individuals and institutions and licensed or otherwise made available to the DHS (for a rather obvious example to prove my point, Windows is licensed from Microsoft, you can't get a copy of Windows for the price of a FOIA request).
Re: (Score:1)
Re: (Score:2)
By itself or in normal amounts or normal handling, Unclassified has no impact on nat'l security. Nat'l security has nothing to do with what *the*company* considers important. Examples: almost all contractor's business info that doesn't overlap class. stuff, source code to company tools, blue
Re: (Score:1)
Actually, it does make sense.
Unisys? (Score:3, Funny)
They Have the Way Out!(TM)
Dan Quayle's DEA record? (it's the coverup) (Score:2)
As
This is a failure of management (Score:1)
Re: (Score:2)
Federal law-enforcement officials said the FBI was taking a look at the incidents -- and Unisys's response -- but said the allegations were so far not viewed as a major breach of national security. "The FBI is making sure that this was not something out of the ordinary," one official said, noting that attempts by hackers to infiltrate U.S. government computers are "everyday occurrences.
Not surprising (Score:1, Interesting)
1. When a user asked for a password change, we were not supposed to challenge them in any way. This included people as high up as the Secretary(or more accurately-the secretary's assistant), but we didn't even have a list of who his assistants were.
2. Each desk had two systems, one Unisys and one DH
Re: (Score:2)
Well didn't you know... (Score:1)
;)
1.7 billion (Score:3, Funny)
What I want to know is what the hell could cost 1.7 billion dollars? Are they putting HA systems with redundant fiber channel SANs on every desktop? How big is the DHS? If were talking even 100,000 people that's over $17,000 per person in IT costs. For that kind of money they should have had big time segmentation with all kinds of traffic monitoring and IDSes along with honeypots and tarpits. Hell, for that kinda money I would even include fart detectors.
UGH! (Score:1)
Re: (Score:1)
-a.d.-
Re: (Score:2)